Security

Results: 374843



#Item
201Mathematics / Theoretical computer science / Constraint programming / Functions and mappings / Electronic design automation / Logic in computer science / NP-complete problems / Satisfiability modulo theories / Rounding / Limit of a function / Function

Real Behavior of Floating Point Numbers * Bruno Marre1 , Fran¸cois Bobot1 , and Zakaria Chihani1 CEA LIST, Software Security Lab, Gif-sur-Yvette, France

Add to Reading List

Source URL: smt-workshop.cs.uiowa.edu

Language: English - Date: 2017-09-02 14:08:49
202Computer security / Computing / Compiler construction / Computer programming / Software engineering / Return-oriented programming / Control-flow integrity / Code reuse / Control flow graph / Program analysis / Data-flow analysis / Cyberattack

Poster: CRAFTED: Code Reuse Analysis for Trusted and Effective Defense Ethan Johnson Tianqin Zhao John Criswell

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 00:24:54
203Cryptocurrencies / Blockchains / Ethereum / Computing / Concurrent computing / Distributed computing / Cross-platform software / Bitcoin / Smart contract / Solidity

A Visual Guide to Quantstamp 01 What is Quantstamp’s mission? Quantstamp is a Y Combinator backed security company that is

Add to Reading List

Source URL: quantstamp.com

Language: English - Date: 2018-10-19 18:01:06
204Prevention / Security / Safety / Fire prevention / Fire protection / Fire safety / Security guard

Bolle_A4_Factsheet_General Security Regulations / House Rules.indd

Add to Reading List

Source URL: www.bolle-meierei.com

Language: English - Date: 2017-06-09 05:30:38
205Economy / Finance / Money / Investment / Financial markets / Financial law / Bond market / Investment management / Financial risk / Bond / Asset classes / Portfolio

Capital gain and preservation of capital in an uncertain environment In a world where many security valuations are stretched and the volatility regime is shifting, wealth managers are challenged to put together portfolio

Add to Reading List

Source URL: www.fundexpertsforum.com

Language: English - Date: 2018-05-29 09:59:01
206Algebra / Abstract algebra / Pairing-based cryptography / Mathematics / Group theory / Linear algebra / Module theory / Pairing / Weil pairing / Elliptic curve / Proofs of quadratic reciprocity / Basic hypergeometric series

Implementing Pairings at the 192-bit Security Level Diego F. Aranha1 , Laura Fuentes-Casta˜ neda2 , Edward Knapp3 , Alfred 3 Menezes , and Francisco Rodr´ıguez-Henr´ıquez2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-04-25 16:25:57
207Economy / Finance / Money / Cryptocurrencies / Financial markets / Foreign exchange companies / Foreign exchange market / Micropayment / Ripple / BlackRock / Security / Algorithmic trading

Senior Ripple Veteran Vijay Chetty Joins SharesPost Digital Assets Group Chetty to lead business development for the security token ATS San Francisco, CA — June 8, 2018 — SharesPost, a leading provider of late-stage

Add to Reading List

Source URL: d2wbqcispjulqi.cloudfront.net

Language: English - Date: 2018-09-05 18:55:16
208Computing / Network architecture / Emerging technologies / Information and communications technology / Configuration management / Software-defined networking / Ethernet / OpenFlow / Computer architecture / Access control / Computer network / Network interface controller

Control-data plane intelligence trade-off in SDN Yash Sinha, Siddharth Bhatia Birla Institute of Technology and Science, Pilani, India Abstract— With the decoupling of network control and data

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 21:01:36
209Computer network security / Security engineering / Computing / Cyberwarfare / Honeypot / Spamming / Robotics / Robot / Cyber-physical system / Computer security / Client honeypot

1 Poster: HoneyBot- A Honeypot for Robotic Systems Celine Irvene, Member, IEEE, David Formby, Member, IEEE, Sam Litchfield, Member, IEEE, and Raheem Beyah, Senior Member, IEEE

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-07 21:48:38
210Index of standards articles / Standards / Culture / Four-square cipher

Privacy & Security Toolkit 1/2 Privacy & Security Toolkit start

Add to Reading List

Source URL: mozilla.github.io

Language: English - Date: 2017-10-25 11:59:04
UPDATE